Google

How Do I Keep My Privacy While Using Google? 533

hubert.lepicki writes "I use Google all the time. I keep two GMail tabs open when I'm online (one is private, another is a corporate account), I use Google search, and recently I switched to the Chromium browser. Google's services are fast, easy to use and usually reliable. At the same time, I know Google is tracking everything I do; I can see it in search results or their ads on web pages, which tend to match my interests. After the recent post by Mozilla's community director suggesting Bing has a better privacy policy (a response to questionable comments from Google CEO Eric Schmidt), I started to... 'google' ways of keeping my private data safe while browsing and using Google services. The results weren't very helpful, so I ask you, Slashdotters: how do I stay anonymous to Google while using their services?"
Cellphones

Making Carriers Shoulder Smartphone Security 57

alphadogg writes "Georgia Tech researchers have received a $450,000 NSF grant to boost security of iPhones, BlackBerries and other smartphones and the wireless networks on which they run. And it's those networks where the researchers are really zeroing in. The researchers are looking into ways wireless carriers such as AT&T and Verizon can detect malware on devices and clean up the devices before they do further damage. 'While a single user might realize that a phone is behaving differently, that person probably won't know why,' says Patrick Traynor, assistant professor at Georgia Tech’s School of Computer Science. 'But a cell phone provider may see a thousand devices behaving in the same way and have the ability to do something about it.' Georgia Tech is going to build out a cellular network test bed to try out its remote repair techniques."
Businesses

Are Game Publishers a Necessary Evil, Or Just Necessary? 173

An editorial at GameSetWatch examines whether game publishers really deserve all the flak they get from gamers and developers alike. While some questionable decisions can certainly be laid at their feet, they're also responsible for making a lot of good game projects happen. Quoting: "The trouble comes when the money and the creativity appear to be at odds. ... Developers and publishers often have a curious relationship. The best analogy I can think of is that of parent and child. The publisher or parent thinks it knows best, because it's been there before (shipped more games), and because 'it's my money, so you'll live by my rules.' The developer — or child — is rebellious, and thinks it has all the answers. In many ways, it does know more than the parent, and is closer to what's innovative, but maybe hasn't figured out how to hone that energy yet."
Privacy

Americans Don't Want Targeted Ads 404

itwbennett writes "A survey by the Berkeley Center for Law and Technology at the University of California Berkeley School of Law and the Annenberg School for Communication at the University of Pennsylvania finds that US residents do not want to receive Web advertising tailored to their interests. 66% of those surveyed said they don't want tailored, or targeted, online ads and when asked if online ad vendors should deliver targeted ads by tracking customers' behavior across multiple Web sites, 86% of the 1,000 respondents said no. 35% of respondents said executives of companies that use personal information illegally should face jail time, and 18% said those companies should be put out of business. 'While privacy advocates have lambasted behavioral targeting for tracking and labeling people in ways they do not know or understand, marketers have defended the practice by insisting it gives Americans what they want: advertisements and other forms of content that are as relevant to their lives as possible,' the study said. 'In high percentages, [US residents] stand on the side of privacy advocates.'"
Security

Schneier On Un-Authentication 336

Trailrunner7 writes "Bruce Schenier writes on Threatpost.com: 'In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you un-authenticate yourself? My home computer requires me to log out or turn my computer off when I want to un-authenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability.'"
Games

Review: Champions Online 203

Champions Online is Cryptic Studios' latest entry into the Superhero MMORPG genre, representing several years of advancement in game design both for Cryptic and for MMOs as a whole. It's no longer a new field, and there are now certain expectations about what an MMO should contain, and how it should play. Two major factors to a new game's success or failure are the standards they embrace and do well, and the ones they reject and do differently. Champions Online succeeds at adapting many established concepts, while still setting themselves apart from the typical swords & sorcery backdrop. Read on for the rest of my thoughts.

Image

The Magicians Screenshot-sm 122

stoolpigeon writes "The popularity of web site Will It Blend? is indicative of how people enjoy mashing things together. Of course this kind of sharing and combining has been going on in the arts for quite some time. The new Lev Grossman novel, The Magicians asks 'will it blend?' of two rather popular fantasy series, J.K. Rowling's world of Harry Potter and the tales of Narnia from C.S. Lewis. Grossman's thoughts on both are tossed on top and then the author begins to play a symphony across the full range of buttons from stir to liquefy. What comes out is not children's fantasy but at times a rather bitter mix." Keep reading for the rest of JR's review.
Games

Blizzcon 2009 Wrap-Up 297

Last year's Blizzcon was tremendously popular. So much so that their servers were unable to handle the strain of fans competing for 15,000 available tickets. This year, Blizzard was more prepared; they made an additional 5,000 tickets available and set up a queue so that the transaction servers weren't overwhelmed. CEO Mike Morhaime said during the keynote address that if you weren't able to get into the queue within 30 seconds of its opening, the tickets were sold out before your turn came. Tens of thousands more chose to order the pay-per-view coverage, demonstrating the extraordinary enthusiasm felt for Blizzard's games. Their presentations didn't disappoint. Read on for details on the status of StarCraft II, Diablo III, World of Warcraft: Cataclysm, and the new Battle.net. It's divided into sections by game in case you're only interested in one or two of them.

Role Playing (Games)

BlizzCon Keynote — New WoW Expansion, Diablo 3 Details 316

BlizzCon kicked off this morning with a keynote address that brought some major announcements for some of their games. First, World of Warcraft's third expansion, Cataclysm, was officially revealed. It differs from the previous expansions in that they will not be creating an entirely new continent for players to explore. Instead, the two huge continents from the original game will be going through a literal cataclysm, causing some zones to be destroyed, new ones to become available, and existing ones to be entirely revamped. Big news came for Diablo III as well, with the announcement of the Monk class and a trailer showing how it plays. More details for both games as well as StarCraft II will undoubtedly become available over the next few days, but read on for more about what we already know. If you have any questions, don't forget to post them here.
Patents

How To Vet Clever Ideas Without Giving Them Away? 539

Rival writes "As an inquisitive and creative geek, I am constantly coming up with 'clever' ideas. Most often I discover fundamental or practical flaws lurking in the details, which I'm fine with. As Edison said, 'I haven't failed; I've found 10,000 ways that don't work.' Other times, I discover that someone else has beaten me to the idea. I'm fine with that, too. At least I know that I've come up with a great idea, even if I'm not the first. There are times, however, when I can find no flaws with an idea and nobody else seems to have thought of it. I'm not conceited enough to think my idea is genius; I just assume that I'm not knowledgeable enough to see what I'm missing. In these times, I often want to ask a subject matter expert for their thoughts. On the admittedly long chance that an idea is genius, however, what is the best way to ask for another's insights while mitigating the risk of them stealing or sharing the idea? Asking a stranger to sign a contract before discussing an idea seems like a good way to get a door closed on my face. What are your experiences and suggestions?"

R.I.P. FTP 359

Slashdot contributor Bennett Haselton says "Using FTP to administer a website is insecure -- but not for the reasons that you probably think. You yourself can stop using FTP any time you want, but how do we change the landscape Net-wide, to reduce the number of breakins using stolen FTP credentials?" You know what to click on if you want to read the rest.
Image

Beautiful Security Screenshot-sm 81

brothke writes "Books that collect chapters from numerous expert authors often fail to do more than be a collection of disjointed ideas. Simply combining expert essays does not always make for an interesting, cohesive read. Beautiful Security: Leading Security Experts Explain How They Think is an exception to that and is definitely worth a read. The book's 16 chapters provide an interesting overview to the current and future states of security, risk and privacy. Each chapter is written by an established expert in the field and each author brings their own unique insights and approach to information security." Keep reading for the rest of Ben's review.

A System For Handling 'Impostor' Complaints 165

Frequent Slashdot contributor Bennett Haselton writes "A woman sued Yahoo because they wouldn't remove a page created by her ex-boyfriend pretending to be her and soliciting strangers for sex. What would be an effective system for large companies like Yahoo to handle 'impostor' complaints, without getting bogged down by phony complaints and unrelated disputes? This is a harder problem than it seems because of the several possible cases that have to be considered. One possible solution is given here." Read on for Bennett's analysis.
The Media

Letting Time Solve the Online News Dilemma 188

The Guardian's John Naughton isn't looking to micro-transactions or licensing fees from search services to solve the online news business model problems that have come to a head recently. Instead, he's simply waiting for capitalism to do its job in killing off the providers who can't cut it. Once that happens, he says, the remaining organizations will be in a far better position to see what web-goers will pay for online news, and he doesn't think it will inhibit the growth of an increasingly information-rich news ecosystem. "Things have got so bad that Rupert Murdoch has tasked a team with finding a way of charging for News Corp content. This is the 'make the bastards pay' school of thought. Another group of fantasists speculate about ways of extorting money from Google, which they portray as a parasitic feeder on their hallowed produce. ... But what will journalism be like in the perfectly competitive online world? One clue is provided by the novelist William Gibson's celebrated maxim that 'the future is already here; it's just not evenly distributed.' In a recent lecture, the writer Steven Johnson took Gibson's insight to heart and argued that if we want to know what the networked journalism of the future might be like, we should look now at how the reporting of technology has evolved over the past few decades."
Portables

Does Dell Know What Women Want In a Laptop? 669

Hugh Pickens writes "Finding the right approach for gender-specific marketing can be really tricky, said Andrea Learned, a marketing expert and author of Don't Think Pink — What Really Makes Women Buy. So when Dell recently took the wraps off a new Web site called Della, geared toward women, featuring tech 'tips' that recommended calorie counting, finding recipes, and watching cooking videos as ways for women to get the most from a laptop, a backlash erupted online, as both women and men described the Web site as 'ridiculous' and 'gimmicky.' Della's heavy emphasis on colors, computer accessories, dieting tips, and even the inclusion of a video about vintage shopping 'seems condescending to women consumers,' says Learned. Instead, Dell should have emphasized function and figured out ways to sell the netbooks that weren't clichéd and reliant on gender stereotypes. 'Some brands go too far with the girlie stuff,' Learned says. 'Della's marketing strategy sounds like it's advertising a purse. There's a level of consumer sophistication they're missing.'"
Image

Artificial Ethics Screenshot-sm 210

basiles writes "Jacques Pitrat's new book Artificial Ethics: Moral Conscience, Awareness and Consciencousness will be of interest to anyone who likes robotics, software, artificial intelligence, cognitive science and science-fiction. The book talks about artificial consciousness in a way that can be enjoyed by experts in the field or your average science fiction geek. I believe that people who enjoyed reading Dennet's or Hofstadter's books (like the famous Godel Escher Bach) will like reading Artificial Ethics." Keep reading for the rest of Basile's review.
Censorship

On the Advent of Controversial Video Games 343

eldavojohn writes "At some point in the history of video games, violence became uncomfortably real for censors and some parents. In addition to that, realistic use of narcotics has entered mainstream games. While gamers (of adult age) have by and large won the right to this entertainment, a large amount of games have arisen lately that challenge a different aspect of video games — inappropriate or sensitive topics. We've covered it before on Columbine to Fallujah, but I noticed through GamePolitics recently a large trend in severely controversial video games. Where do you stand on these titles?" Read on for the rest of eldavojohn's thoughts.
Government

Let Big Brother Hawk Anti-Virus Software 405

Frequent Slashdot contributor Bennett Haselton writes with his idea for mass adoption of anti-virus software: "If the US government did more to encourage people to keep their computers secure — by buying TV ads to publicize free private-sector anti-virus programs, or subsidizing the purchase of anti-virus software — we'd all be better off, on average. That's not just idealistic nanny-statism, but something you can argue mathematically, to the point where even some libertarians would agree." Read on for the rest of Bennett's thoughts.
Image

Styling Web Pages With CSS Screenshot-sm 104

r3lody writes "Styling Web Pages with CSS: Visual QuickProject Guide, by Tom Negrino and Dori Smith, helps the beginning web designer learn how to use CSS in a simple, easy-to-follow format. This being my first exposure to one of the Visual QuickProject Guides by Peachpit Press, I was both pleased and disappointed when I received this slim volume. I was pleased in the presentation and clear descriptions given to each aspect of Cascading Style Sheets (CSS). I was disappointed in the brevity of the text, and the lack of downloadable materials to use to follow the examples in the book." Read below for the rest of Ray's review.
Communications

Bandwidth Fines Bad, But Not Net Neutrality Issue 159

Frequent Slashdot contributor Bennett Haselton writes with his take on the recent Time Warner Cable fiasco: "Net Neutrality crusaders at FreePress.net recently called attention to Time Warner's plan (later rescinded) to impose fines on users for going over bandwidth limits. I agree generally, but I think this is easily confused with the reasoning in favor of Net Neutrality, and it's important to keep the arguments separate." Read on for the rest of Bennett's thoughts.

Slashdot Top Deals